|
||||||
|
||
|
Home > Security software |
|
|
181. | MagicTweak 3.20 (magictweak.com) | ||
setting (from Start Menu,Desktop,IE skin,System Icon to System Security) that just doesn't seem to be there. With the ability to cutomize almost any aspect of Windows, you can become a Windows expert almost instantly! MagicTweak is a special Tweaking software designed to optimize and personalize Windows XP/2000/Me/9X | |||
Updated: 2, 2006 | Rating: 195 | Author: Albert Hoffmann | Size: 1666 kb | Shareware Go to category: Games & Entertainment > Tools & Editors Similar programs | |||
182. | Locked! 4.7.8 (jcmatt.com) | ||
combines simplicity of setup and use with a powerful two-tiered security system. Whether your system is powered off or on, Locked! securely protects your computer against access by others. It's proprietary multi-level structure integrates deeply within the Windows architecture, working with and controlling access until you unlock it with a password. Entries from the keyboard and | |||
Updated: 2, 2006 | Rating: 0 | Author: James Matt | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
183. | Lock My PC 3.4 (fspro.net) | ||
computer systems from the inside. Human factor is still the greatest security issue today. Co-workers and even our spouses can easily recover any bit of information we attempt to hide in vain on our computers simply by looking at the screen of an unattended machine. It is all that easy! Just wait for | |||
Updated: 2, 2006 | Rating: 0 | Author: FSPro Labs | Size: 1005 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
184. | PC LockUp 2.185 (getfreefile.com) | ||
LockUp is a computer security software, which enables you to apply password protection to Windows and restrict others from being able to use your PC while you are away. It starts automatically with Windows and optionally locks your desktop upon loading. It hides your desktop at the same time and shows | |||
Updated: 2, 2006 | Rating: 0 | Author: Ixis Ltd Ixis Ltd | Size: 839 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
185. | Kryptel 5.31 (kryptel.com) | ||
of strong encryption algorithms. The program provides a one-click security solution and can process any number of files or folders in a single operation. Kryptel can be run in unattended batch mode and can be used to automate encryption tasks. The package contains a tool for creating encrypted backups and an integrated file shredder for secure deletion of sensitive data. Kryptel is a | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
186. | Kryptel 5.31 (bestcrypto.com) | ||
of strong encryption algorithms. The program provides a one-click security solution and can process any number of files or folders in a single operation. Kryptel can be run in unattended batch mode and can be used to automate encryption tasks. The package contains a tool for creating encrypted backups and an integrated file shredder for secure deletion of sensitive data. Kryptel is a | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
187. | Keylogger Hunter 2.1 (styopkin.com) | ||
which would play a role of a “second echelon” for your data security. Utility for blocking the activity of keyboard monitoring programs presumably running on your PC. Neutralizes up to 90% of keyloggers, depriving them of information about the pressed | |||
Updated: 2, 2006 | Rating: 0 | Author: Alexander Styopkin | Size: 611 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
188. | KGB Free Key Logger 1.93 (refog.com) | ||
(a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as | |||
Updated: 2, 2006 | Rating: 2482 | Author: ReFog Software | Size: 1477 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
189. | KGB Spy 3.93 (refog.com) | ||
(a.k.a. key logger) that is widely used by both regular users and IT security specialists. The reason for such popularity is that this program does not just record keystrokes; it is capable of recording language specific characters (ex. umlauts), date and time certain window was initiated as well as | |||
Updated: 2, 2006 | Rating: 132 | Author: ReFog Software | Size: 1481 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
190. | Infiltrator Network Security Scanner 3.0 (infiltration-systems.com) | ||
is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of know vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information | |||
Updated: 2, 2006 | Rating: 42 | Author: Nathan Polencheck | Size: 1350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Security software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|